Appears In

Phishing is a type of social engineering where an attacker sends a fake message designed to trick a person into revealing sensitive information to the attacker or attempts to deploy malicious software on the victim’s infrastructure like ransomware. Phishing attacks have become increasingly sophisticated and often transparently mirror websites, allowing the attacker to observe everything while the victim is navigating the site, and transverse any security boundaries with the victim.

Types of Phishing

E-mail Phishing

  • Spear — Spear phishing involves an attacker directly targeting a specific organization or person with tailored phishing emails. These emails can deliver shortened links which may lead to downloads containing malware. The risk of these links is impossible to distinguish due to there being no standard URL.
  • Whaling — Whaling refers to spear phishing attacks directed specifically at senior executives and other high-profile targets.

Phone Phishing

  • Voice — Attackers may call directly or utilize applications to dial a large quantity of telephone numbers and play recordings which impersonate organizations to make false claims of fraud on the victim’s accounts.
  • Text — Similar to email phishing, except attackers use cell phone text messages to deliver the “bait.”

Websites

  • Page Hijacking — Attackers compromise legitimate web pages in order to redirect users to a malicious website.

Avoid Being A Victim

  • Do not reveal personal or financial information in an email, do not respond to email solicitations for information, and do not follow links in these emails.
  • Before sending or entering sensitive info online, check the security of the website.  Make sure you see https:// in the address.  The “s” stands for secure.
  • Pay attention to the website’s URL. Malicious websites may look identical to a legitimate site, but the URL may vary in spelling or a different domain.
  • If you are unsure whether an email request is legitimate, try to verify it by contacting the company directly, not information provided in an email.
  • Keep all software on internet-connected devices up to date to reduce the risk of infection from malware.
  • Use multi-factor authentication with as many apps, accounts, and social platforms as you can.

What if You Are A Victim?

  • If the attack happens on you work computer, report it to the appropriate people in your organization, including network administrators. They can be alert for any suspicious or unusual activity. 
  • If the attack happens on your personal computer, consider reporting the attack to your local police department, and file a report with the Federal Trade Commission or the Internet Crime Complaint Center.
  • Watch for any unauthorized charges to your account. If you believe your financial accounts may be compromised, contact your financial institution immediately and close the account(s).

More stories

  • VA Employees Sound Off on IT Customer Service

     3 months ago

    VA Employees Sound Off on IT Customer Service

    You were asked what you thought about VA’s IT services. Here’s what you said.

  • FCW 100 Award Honors VA Program Manager for Outstanding Public Service

     June 29, 2022

    FCW 100 Award Honors VA Program Manager for Outstanding Public Service

    IT Program Manager Angela Gant-Curtis was named on the FCW 100 list for her distinguished work in Federal IT and unparalleled dedication to the Department of Veterans Affairs.

  • Before You Hit ‘Send’, Consider these Email Accessibility Tips  

     May 24, 2022

    Before You Hit ‘Send’, Consider these Email Accessibility Tips  

    We can’t avoid sending and receiving emails, but we can avoid making those emails inaccessible for those with visual or auditory impairments. Learn about how you can compose emails that ensure equal access for everyone, by incorporating accessible design features into your emails.